Skip to main content

Full text of "State court judge's order denying motion to dismiss"

See other formats


SUPREME COURT OF THE STATE OF NEW YORK 
COUNTY OF NEW YORK: PART 41 

THE PEOPLE OF THE STATE OF NEW YORK, : 

Indictment Number 4447/12 

-against- : 

SERGEY ALEYNIKOV, : Decision & Order 

Defendant. : 

x 

ZWEIBEL, J. : 

Defendant moves to dismiss the instant indictment on the 
ground of facial insufficiency, double jeopardy, collateral 
estoppel, vindictive prosecution and in the interest of justice. 

Background 1 

Goldman Sachs & Co. ("Goldman") is an international 
financial services firm which engages in high frequency trading 
("HFT") on securities and commodities markets, such as the New 
York Stock Exchange ("NYSE") and NASDAQ Stock Market ("NASDAQ") , 
as part of its business. From May 2007 through June 2009, 
defendant was employed by Goldman as a computer programmer in its 
Equities Division, developing and maintaining certain computer 
programs for the company's proprietary HFT system. A HFT system 
is a mechanism for making large volumes of trades in securities 



1 The Court has adopted or adapted the relevant portions of 
United States Court of Appeals for the Second Circuit' s 
description of the background of this case through the Court' s 
dismissal of the federal action and has added or deleted from it 
where relevant (see United States v. Aleynikov , 676 F.3d 71, 73- 
75 [2d Cir. 2012] ) . 



and commodities based on trading decisions effected in fractions 
of a second through algorithms that incorporate rapid market 
developments and data from past trades. The computer programs 
used to operate Goldman's HFT system are of three kinds: [1] 
market connectivity programs that process real-time market data 
and execute trades; [2] programs that use algorithms to determine 
which trades to make; and [3] infrastructure programs that 
facilitate the flow of information throughout the trading system 
and monitor the system's performance. Aleynikov's work focused on 
developing source codes for this last category of infrastructure 
programs in Goldman's HFT system. HFT is a competitive business 
that depends in large part on the speed with which information 
can be processed to seize fleeting market opportunities. Goldman 
closely guards the secrecy of each component of the system, and 
does not license the system to anyone . Goldman ' s confidentiality 
policies bound defendant to keep in strict confidence all the 
firm's proprietary information, including any intellectual 
property created by defendant. 2 He was barred as well from taking 

defendant, as a condition of his employment, was required 
to sign a global information security policy, which provided in 
relevant part that he would "hold all confidential and 
proprietary information and materials in strict confidence and, 
except for the above authorized uses, will not, nor permit any 
agent to give, disclose, copy, reproduce, sell, assign, license, 
market or transfer confidential and proprietary information and 
materials to any person, firm or corporation..." The security 



2 



it or using it when his employment ended. 

By 2009, Aleynikov was earning $400,000, the highest-paid of 
the twenty- five programmers in his group. In April 2009, he 
accepted an offer to become an Executive Vice President at Teza 
Technologies LLC, a Chicago-based startup firm, that was looking 
to develop its own HFT system. Aleynikov was hired, at 
approximately $1 million a year, to develop the market 
connectivity and infrastructure components of Teza's HFT system. 
Teza's founder (a former head of HFT at Chicago-based hedge fund 
Citadel Investment Group) emailed Aleynikov (and several other 
employees) in late May, conveying his expectation that they would 
develop a functional trading system within six months. It 
usually takes years for a team of programmers to develop a HFT 
system from scratch. 

After defendant resigned from Goldman in April of 2009, he 
was allowed to remain at the firm for five weeks more . 
Aleynikov' s last day at Goldman was June 5, 2009. 

From March 30, 2009 until May 2009, defendant uploaded data 



policy also provided that defendant "irrevocably assign" to 
Goldman and that Goldman would have "exclusive ownership rights, 
including, without limitation, all patents, copyright and trade 
secret rights with respect to any work, including, but not 
limited to, any invention, discoveries, concepts, ideas or 
information, conceived" by defendant during the course of his 
employment with Goldman. 99 



3 



from Goldman to a "subversion" website, with an address of 
svn.xp-dev.com. At approximately 5:20 p.m., just before his 
going-away party, defendant encrypted and uploaded to the 
subversion server in Germany more than 500,000 lines of source 
code for Goldman's HFT system, including code for a substantial 
part of the infrastructure, and some of the algorithms and market 
data connectivity programs. Some of the code pertained to 
programs that could operate independently of the rest of the 
Goldman system and could be integrated into a competitor's 
system. In addition to proprietary source code, Aleynikov also 
transferred some open source software licensed for use by the 
public that was mixed in with Goldman's proprietary code. 
However, he uploaded a greater number of files that contained 
proprietary code than open source code 3 . 

After uploading the source code, Aleynikov deleted the 
encryption program as well as the "bash" history of his computer 
commands. When he returned to his home in New Jersey, Aleynikov 
downloaded the source code and other material he had stored on 
the server in Germany to his home computer, and copied some of 
the files to other computer devices he owned. 

3 "Open source" code is available to the public on-line at no 
cost. For instance, part of Goldman's HFT system runs on the 
Linux operating system which is completely composed of open 
source code . 



4 



Defendant' s uploads to the subversion website attracted the 
attention of Goldman's computer security team on June 29, 2009. 
Goldman then alerted the authorities. On July 2, 2009, Aleynikov 
flew from New Jersey to Chicago to attend meetings at Teza. He 
brought with him a flash/ thumb drive and a laptop containing 
portions of the Goldman source code . When Aleynikov flew back 
the following day, he was arrested by the Federal Bureau of 
Investigation ("FBI") agents at Newark Liberty International 
Airport. The source code was also found on defendant's home 
computer . 

In a statement to FBI agent Michael McSwain, defendant 
admitted to intentionally collecting both open and proprietary 
source code, with the idea of separating out the open source code 
once he had downloaded it to his home computer. 

Defendant was initially charged in a federal indictment that 
accused him of violating the Economic Espionage Act of 1996 
("EEA") , 18 USC § 1832, by downloading a trade secret "that is 
related to or included in a product that is produced for or 
placed in interstate or foreign commerce," with the intent to 
convert such trade secret and to injure its owner, to the 
economic benefit of anyone other than the owner (see 18 U.S.C. § 
1832(a) [Count One]); and with violating the National Stolen 
Property Act ("NSPA") , 18 U.S.C. § 2314, which makes it a crime 

5 



to " transport [ ] , transmit [ ] , or transfer [ ] in interstate or 
foreign commerce any goods , wares , merchandise , securities or 
money, of the value of $5,000 or more, knowing the same to have 
been stolen, converted or taken by fraud" (18 U.S.C. § 2314 
[Count Two] ) . A third count charged him with unauthorized 
computer access and exceeding authorized access in violation of 
the Computer Fraud and Abuse Act ("CFAA") , (18 U.S.C. § 1030). 

Aleynikov moved to dismiss the federal indictment for 
failure to state an offense. On September 3, 2010, the district 
court dismissed Count Three of the indictment after finding that 
defendant's conduct did not fall within the federal anti-hacking 
statute but otherwise denied Aleynikov 's motion (see United 
States v. Aleynikov , 737 F.Supp.2d 173 [SDNY 2010]). 

After a jury trial , defendant was convicted on both 
remaining counts and sentenced to 97 months of imprisonment 
followed by a three-year term of supervised release, and was 
ordered to pay a $12,500 fine. Bail pending appeal was denied 
because Aleynikov, a dual citizen of the United States and 
Russia, was feared to be a flight risk. 

On February 17, 2012, Aleynikov appealed his conviction and 
sentence, arguing that his conduct did not constitute an offense 
under either the NSPA or EEA. The Second Circuit reversed 
Aleynikov 's convictions on both counts, concluding, as the People 

6 



point out, that defendant's conduct did not fit within the narrow 
confines of the two federal statutes under which he was charged, 
(see United States v. Aleynikov , 676 F.3d 71, 73- 75 [2d Cir. 
2012]; see Affirmation of ADA Joanne Li, dated November 29, 2012, 
p. 3). 

Thereafter, in April 2012, the Office of the New York County 
District Attorney ("DANY") became aware of the Second Circuit's 
decision reversing defendant's federal conviction (see 
Affirmation of ADA Joanne Li, dated November 29, 2012, p. 1-2, f 
3). In reversing defendant's conviction, the Second Circuit 
observed : 

The conduct found by the jury is conduct 

that [defendant] should have known was in 

breach of his confidentiality obligations 

to Goldman, and was dishonest in ways that 

would subject him to sanctions ; but he could 

not have known that it would offend this criminal 

law or this particular sovereign, 

referring to the federal statutes under which he was 

prosecuted ( United States v. Aleynikov , 676 F.3d, at 82). 

The People took this as an "invitation" (see Affirmation of 

ADA Joanne Li, dated November 29, 2012, p. 4). After reviewing 

the Second Circuit's decision, DANY contacted the federal 

prosecutor' s office to express interest in pursuing a state 

prosecution of defendant and on July 31, 2012, charged defendant, 

by arrest warrant, with one count of Unlawful Duplication of 

7 



Computer Related Material in the First Degree (Penal Law § 
156.30[1]) and one count of Unlawful Use of Secret Scientific 
Material (Penal Law § 165.07) . A New York County Grand Jury 
then indicted defendant on each of the counts in the arrest 
warrant . 

The motion for inspection and/or dismissal of the Grand Jury 
minutes is granted to the extent that the Court has examined the 
Grand Jury minutes in camera and found both the testimonial and 
documentary non-hearsay evidence before the Grand Jury to be 
legally sufficient, the instructions to be proper and the 
proceeding to be otherwise unimpaired. The issues in the 
defendant's motion, while numerous, are straightforward, and 
disclosure of the Grand Jury minutes is not necessary to their 
resolution (see CPL § 210. 30 [3]). Accordingly, the motion to 
dismiss the indictment on these grounds is denied. 

The Court specifically notes that the indictment satisfies 
the CPL 200.50(7) requirement that the indictment contain a 
"plain and concise factual statement in each count which, without 
allegations of an evidentiary nature [and it] ... asserts facts 
supporting every element of the offense charged and the 
defendant's or defendants' commission thereof with sufficient 
precision to clearly apprise the defendant or defendants of the 
conduct which is the subject of the accusation" (see People v 

8 



Iannone, 45 N.Y.2d 589 [1978]). "[T]he charges use the language 
of the statutes involved, unless the language is too broad" 
( People v. Perez , 93 AD3d 1032, 1034 [3 rd Dept.], lv. den. 19 NY3d 
1000 [2012] , citing Iannone, 45 N.Y.2d, at 599) . In this case, 
the indictment not only tracked the statutory language, it 
provided additional information as to the location, date and time 
of the offenses, thus alleging "where, when and what" defendant 
purportedly did (Perez, 93 AD3d, at 1034, quoting Iannone, 45 
N.Y.2d at 598) . 

With respect to the legal sufficiency of the indictment, an 
indictment is legally sufficient when "it possesses competent 
evidence that establishes every element of an offense by legally 
sufficient evidence and provides reasonable cause to believe that 
a person has committed such offense" ( People v. Williams , 20 AD3d 
72 [1 st Dept.], lv. denied 5 NY3d 811 [2005]; see CPL 190.65[1] 
People v. Swamp , 84 N.Y.2d 725, 729-730 [1995]). "[A] reviewing 
court must consider ^whether the evidence viewed in the light 
most favorable to the People, if unexplained and uncontradicted, 
would warrant conviction by a petit jury'" ( People v. Grant , 17 
NY3d 613, 616, quoting People v. Bello , 92 N.Y.2d 523, 525 
[1998], quoting People v. Jennings , 69 N.Y.2d 103, 114 [1986]). 
Legally sufficient evidence is "competent evidence which, if 
accepted as true, would establish every element of an offense 

9 



charged" ( Grant , 17 NY3d, at 616, quoting CPL 70.10 [1]; see also 

People v. Swamp , 84 N.Y.2d, at 730; People v. Mayo , 36 N.Y.2d 

1002, 1004 [1975]). "In the context of a Grand Jury proceeding, 

legal sufficiency means prima facie proof of the crimes charged, 

not proof beyond a reasonable doubt" ( id. , quoting Bello , 92 

N.Y.2d, at 526). Thus, a reviewing court must determine "whether 

the facts, if proven, and the inferences that logically flow from 

those facts supply proof of every element of the charged crimes , " 

and whether "the Grand Jury could rationally have drawn the 

guilty inference" ( id. , quoting People v. Deegan , 69 N.Y.2d 976, 

979 [1987]) and defer all questions as to whether the weight or 

quality of the evidence would warrant conviction ( Swamp , 84 N.Y., 

at 730; see People v. Williams , 20 AD3d 72) . 

The Court notes that the Grand Jury presentation was 

comprised of non-hearsay testimonial and documentary evidence. 

With respect to the Unlawful Duplication of Computer Related 

Material in the First Degree count, Penal Law § 156.30(1) states: 

A person is guilty of unlawful duplication 
of computer related material in the first 
degree when having no right to do so, he ... 
copies, reproduces or duplicates in any 
manner : 

1. any computer data or computer program 
and thereby intentionally and wrongfully 
deprives or appropriates from an owner thereof 
an economic value or benefit in excess of 
two thousand five hundred dollars; . . . 

10 



Penal Law § 156.00(1) defines "Computer" as 



a device or group of devices which, by- 
manipulation of electronic, magnetic, optical or 
electrochemical impulses , pursuant to a computer 
program, can automatically perform arithmetic, 
logical, storage or retrieval operations with or 
on computer data, and includes any connected or 
directly related device, equipment or facility 
which enables such computer to store, retrieve or 
communicate to or from a person, another computer 
or another device the results of computer 
operations , computer programs or computer data . 

Penal Law § 156.00(2) defines "Computer program" as 

property and means an ordered set of data 
representing coded instructions or statements 
that, when executed by computer, cause the 
computer to process data or direct the computer 
to perform one or more computer operations or both 
and may be in any form, including magnetic storage 
media, punched cards, or stored internally in the 
memory of the computer. 

Penal Law § 156.00(3) defines "Computer data" as 

property and means a representation of 
information, knowledge, facts, concepts or 
instructions which are being processed, or have 
been processed in a computer and may be in any 
form, including magnetic storage media, punched 
cards, or stored internally in the memory of the 
computer . 

Penal Law § 156.00(4) defines "Computer service" as 

any and all services provided by or through 
the facilities of any computer communication 
system allowing the input, output, examination, or 
transfer, of computer data or computer programs 
from one computer to another. 

Penal Law § 156.00(6) defines "Computer network" as 



11 



the interconnection of hardwire or wireless 
communication lines with a computer through remote 
terminals, or a complex consisting of two or more 
interconnected computers . 

Penal Law § 156.00(7) defines "Access" as 

to instruct, communicate with, store data in, retrieve 
from, or otherwise make use of any resources of a 
computer, physically, directly or by electronic means. 

Penal Law § 156.00(8) defines "Without authorization" as 

to use or to access a computer, computer service or 
computer network without the permission of the owner or 
lessor or someone licensed or privileged by the owner 
or lessor where such person knew that his or her use or 
access was without permission or after actual notice to 
such person that such use or access was without 
permission. It shall also mean the access of a 
computer service by a person without permission where 
such person knew that such access was without 
permission or after actual notice to such person, that 
such access was without permission. 

Proof that such person used or accessed a computer, 
computer service or computer network through the 
knowing use of a set of instructions, code or computer 
program that bypasses, defrauds or otherwise 
circumvents a security measure installed or used with 
the user's authorization on the computer, computer 
service or computer network shall be presumptive 
evidence that such person used or accessed such 
computer, computer service or computer network without 
authorization . 

Here , there was sufficient evidence that while defendant may 
have had a limited right to copy or reproduce some of the 
material for work-related reasons, he had no right to install and 
use "subversive" software on Goldman Sachs' computer for the 
purpose of copying, reproducing or duplicating in any manner the 



12 



copyrighted source codes or any other copyrighted computer data 
or computer program to intentionally and wrongfully deprive or 
appropriate from Goldman Sachs, as the materials' "owner," an 
economic value or benefit in excess of two thousand five hundred 
dollars. The evidence includes testimony and exhibits that 
establish that on two or more occasions, defendant, without 
permission or authority from Goldman Sachs, copied and 
transferred Goldman Sachs' source code for its high frequency 
trading platform from Goldman Sachs' computers to a foreign 
server in Germany using subversive software, and then downloaded 
this material onto his personal computers and thumb drives, thus 
making a tangible electronic reproduction of confidential and 
proprietary materials related to Goldman's source code. Indeed, 
defendant does not contest that he actually did reproduce the 
relevant materials. Additionally, the Grand Jury could infer 
from the confidentiality/employment agreement signed by defendant 
when he was hired by Goldman Sachs as well as the employee 
handbook setting forth the firm' s policies forbidding the 
disclosure of information concerning or contained in the programs 
on the firm' s computers that defendant' s actions "were motivated 
either by an intention to sell them, use them in his new position 
in order to advance himself or to save himself labor, or at the 
very least, to study and learn from them" ( People v. Katakam , 172 

13 



Misc. 2d 943, 947 [Sup. Ct. N.Y.Co. 1997]). This is further 

supported by evidence that as part of his new job, for which 

defendant was being paid a million dollars, his new employer 

wanted a program, which had taken years to develop at Goldman 

Sachs, up and running in six months. There is also evidence that 

the material copied and reproduced by defendant was worth 

millions to Goldman Sachs . Thus , the evidence is clearly 

sufficient to show that defendant' s actions deprived Goldman 

Sachs of and appropriated from Goldman Sachs an economic benefit 

in excess of $2500. 

Likewise, Penal Law § 165.07 states: 

A person is guilty of unlawful use of secret 
scientific material when, with intent to 
appropriate to himself or another the use of 
secret scientific material, and having no right 
to do so and no reasonable ground to believe 
that he has such right, he makes a tangible 
reproduction or representation of such secret 
scientific material by means of writing, 
photographing, drawing, mechanically or 
electronically reproducing or recording such 
secret scientific material. 

Penal Law §165.00(6) defines "Secret scientific material" as: 

a sample, culture, micro-organism, specimen, 
record, recording, document, drawing or any other 
article, material, device or substance which 
constitutes, represents, evidences, reflects, or 
records a scientific or technical process, 
invention or formula or any part or phase thereof, 
and which is not, and is not intended to be, 
available to anyone other than the person or 
persons rightfully in possession thereof or 



14 



selected persons having access thereto with his 
or their consent, and when it accords or may accord 
such rightful possessors an advantage over 
competitors or other persons who do not have 
knowledge or the benefit thereof. 

In People v. Russo , 131 Misc. 2d 677 (Cty Ct. Suffolk Co. 1986), 

found that computer programs qualifies as "secret scientific 

material" whose unlawful use was prohibited by Penal Law §165.07. 

As the Russo Court notes: 

. . .a computer program does not just exist. 
It is the result of time spent and effort 
exerted on the part of a trained individual 
or individuals . Because such training 
requires study and the learning associated 
with such study results in a specialized 
knowledge, the resulting program— in accordance 
with the above definitions— can therefore be 
described as both "scientific" and "technical." 
Because the "computer program" directs a computer 
to perform steps in a prescribed procedure and 
operations on data to produce a desired result, 
it is a "process." Further, because a "computer 
program" does not exist until it is written or 
created as a result of an individual ' s study or 
experimentation, or, if the computer program 
already exists, and is modified in some way to 
make it different or new, it is, an "invention. 
"Finally, because a "computer program" represents 
a method of doing something that relies on "an 
established model or approach," a "computer 
program" is a "formula" in accordance with the 
definition above. Therefore, based on the above, 
a "computer program" qualifies as "a scientific or 
technical process, invention, or formula" as 
envisioned by Penal Law § 155.00(6) . 

( id. , at 681) . 

Here, the Grand Jury minutes again established through 



15 



testimony and exhibits that defendant, at the very least, with 
intent to appropriate to himself "secret scientific material," 
and knowing he no right to do so because the copy was not made 
for his work at Goldman, made a copy of certain Goldman computer 
programs and source code, which were "secret scientific material" 
(see People v. Russo , supra) . Thus, the evidence in support of 
these counts were also legally sufficient. 

Defendant also claims that the instant prosecution is barred 
by State and Federal double jeopardy as well as statutory double 
jeopardy. Here, defendant was prosecuted in federal court for 
violating the EEA and NSPA. A jury convicted him of these 
crimes . On appeal , the Circuit Court of Appeals for the Second 
Circuit reversed the conviction and dismissed the charge, 
"reasoning that while defendant breached his confidentiality 
obligations to Goldman, his conduct did not fall within the scope 
of the charged federal offenses" ( Aleynikov v. The Goldman Sachs 
Group , Inc . , 2012 WL 6603397, *3 [NDNJ 2012]). Upon the 
dismissal of the federal charges against defendant, the New York 
County District Attorney presented the case to a New York County 
Grand Jury, which indicted defendant of violating Penal Law §§ 
156.30(1) and 165.07. 

The Double Jeopardy clause of the Fifth Amendment provides 
that an individual may not be tried twice for the same offense 

16 



except in limited circumstances . However, under the "dual 

sovereignty" doctrine, successive State and federal prosecutions 

for the same conduct are not prohibited by the United States 

Constitution's Double Jeopardy Clause (see Matter of Polito v. 

Walsh , 8 NY3d 683, 686 [2007], rearg. denied 9 NY3d 918 [2007], 

citing Bartkus v. Illinois , 359 U.S. 121 [1959]). Thus, the 

Blockburger "same-elements" test does not apply here (see 

Blockburger v. United States , 284 U.S. 299, 304 [1932]; Matter of 

Polito v. Walsh , 8 NY3d, 689-690) . 

In New York, double jeopardy is both constitutional and 

statutory ( Matter of Polito v. Walsh , 8 NY3d, at 686) . Statutory 

double jeopardy is governed by CPL 40.20, which "generally 

prohibits successive prosecutions for two offenses based on a 

single act or criminal transaction" ( People v. Bryant , 92 N.Y.2d 

216, 226 [1998] [citations omitted]; see Matter of Polito v. 

Walsh , 8 NY3d, at 686) . Despite this statutory bar, pursuant to 

CPL 40.20 (2) (f ) , sequential prosecutions are permitted for 

offenses arising from the same criminal transaction where: 

One of the offenses consists of a violation of 
a statutory provision of another jurisdiction, 
which offense has been prosecuted in such other 
jurisdiction and has there been terminated by a 
court order expressly founded upon insufficiency 
of evidence to establish some element of such 
offense which is not an element of the other 
offense, defined by the laws of this state 



17 



(see Matter of Polito v. Walsh , 8 NY3d, at 686-687) . 

In this case, the first prosecution of defendant was for 
violations of statutory provisions of another jurisdiction, 
namely, the federal EEA and NSPA statutes. Defendant was 
prosecuted for it in "such other jurisdiction," namely, the 
federal court. The federal prosecution was terminated by the 
Second Circuit. The Second Circuit's order was "expressly 
founded on insufficiency of the evidence" to establish that 
Goldman' s HFT system was intended for interstate or foreign 
commerce as required by the EEA and that the intangible property 
stolen by defendant, such as the source codes, constituted stolen 
"goods," "wares" or "merchandise" under the NSPA. There is no 
corresponding requirement under either Penal Law 156.30(1) or 
165.07, which are the New York State statutes that the defendant 
is accused of violating, that the property in question be 
intended for interstate commerce. Similarly, there is no 
requirement under either Penal Law 156.30(1) or 165.07 that the 
property stolen by defendant, be tangible "good," "wares" or 
"merchandise" as required by the NSPA. Thus, "CPL 40.20(2) (f) 
was evidently written for the purpose of preventing people in the 
exact situation of [this defendant] from relying on the 
protection given by CPL 40.20(2)" ( Matter of Polito v. Walsh , 8 
NY3d, at 687) . 

18 



The Court notes that CPL 40.20(1), which states that: 

A person may not be twice prosecuted for the 
same offense, . . . 

does not assist defendant. As the Court of Appeals has held, the 

same offense "means the same in both fact and law. . .At bar, the 

prosecutions are not the same in law because they are based upon 

separate and distinct statutes...." ( Matter of Polito v. Walsh , 8 

NY3d, at 688, quoting Matter of Klein v. Murtaqh , 34 N.Y.2d 988 

[1974], aff'g on op below 44 A.D.2d 465, 467 [2d Dept. 1974]). 

Defendant tries to argue that CPL 40.20(2) (f) does not apply 
because the federal case was not dismissed for insufficiency of 
evidence, as required by CPL 40.20(2) (f ) , but rather, for facial 
insufficiency of the indictment (Defense Motion : 37n . 11) . The 
Court disagrees. As the People point out, the Second Circuit 
specifically noted that although it was "odd" that the parties on 
appeal had framed their arguments in terms of facial 
insufficiency of the indictment since the case had gone to trial, 
their decision was the same under either analysis (see People's 
Response:17; United States v. Aleynikov , 676 F.3d, at 76, n. 3). 
Thus, CPL 40.20 (2) (f ) ' s requirement that the federal case be 
dismissed for insufficiency of a federal element is satisfied. 

As to defendant' s claim that the instant prosecution is 
barred because Judge Denise Cote of the Southern District of New 



19 



York dismissed the count based on a violation of the CFAA charge 
prior to trial, that claim is meritless . Because that count was 
dismissed prior to trial, defendant was never placed in jeopardy 
for it (see CPL 40.30) and defendant is not charged with the 
equivalent cyber-crime statute, namely, Penal Law § 156.10. 
Specifically, the CFAA count was dismissed from the federal 
indictment during motion practice because the federal anti- 
hacking statute required proof that the defendant had gained 
access to Goldman's computers without permission or 
authorization. However, neither of the crimes defendant is 
charged with in his State indictment requires that his access to 
Goldman's computers be unauthorized. 

Accordingly, the instant prosecution is not barred under 
double jeopardy grounds and is expressly permitted under CPL 
40.20 (2) (f) . 

Defendant further argues the doctrine of collateral estoppel 
mandates that the indictment be dismissed. Collateral estoppel 
"means simply that when an issue of ultimate fact has once been 
determined by a valid and final judgment, that issue cannot again 
be litigated between the same parties in any future lawsuit" 
( People v. Sommerville , 3 Misc3d 593, 598 [Sup. Ct Kings Cop. 
2004], quoting Ashe v. Swenson , 397 U.S. 436, 443 [1970]). If 
"the 'ultimate fact' issue, i.e., that which is essential to 

20 



conviction in the later trial is resolved in defendant's favor, 
the subsequent prosecution is foreclosed" ( People v. Sonimerville , 
3 Misc. 3d, 598, citing People v. Goodman , 69 N.Y.2d 32, 38 
[1986]). "However, if the resolved issue concerns an 
'evidentiary' fact tending to establish guilt at the second 
trial, the subsequent prosecution is not precluded, only , further 
litigation' of this 'evidentiary' fact is prohibited" ( id. , 
citing People v. Acevedo , 69 N.Y.2d 478 [1987]). 

It is well settled that the doctrine of collateral estoppel 
applies to criminal proceedings as well as civil ones ( People v. 
Goodman , 69 N.Y.2d 32, 37 [1986] [citations omitted]; see also 
People v. Hilton , 95 N.Y.2d 950, 952 [2000]; Sommerville , 3 
Misc3d, at 598) , and operates to "bar relitigation of issues 
necessarily resolved in defendant's favor at an earlier trial" 
( People v. Acevedo , 69 N.Y.2d 478, 485 [1987]; see also People v. 
Evans, 94 N.Y.2d 499, 502 [1999]; see also Sommerville , 3 Misc3d, 
at 598) . 

Although part of the constitutional guarantee against 
double jeopardy (Goodman, 69 N.Y.2d at 37, citing Ashe v. 
S wens on , 397 U.S. 436; People v. Moore , 220 A.D.2d 621, 622, 
appeal denied 87 N.Y.2d 923), double jeopardy differs from 
collateral estoppel in that double jeopardy applies to 
subsequent prosecutions involving the same offense and "may 

21 



attach long before the jury has rendered a verdict, whereas 
collateral estoppel applies only when there has been a final 
judgment" followed by new or different charges arising from the 
same incident ( Goodman , 69 N.Y.2d at 37-38). 

However, "[b]efore collateral estoppel may be applied in a 
subsequent criminal case, there must be an identity of parties 
and issues and a prior proceeding resulting in a final and valid 
judgment in which the party opposing the estoppel had a ^ull 
and fair opportunity' to litigate" ( People v. Suarez , 40 AD3d 
143, 152 [1 st Dept.], lv. denied 8 NY3d 991 [2007], quoting 
Goodman, 69 N.Y.2d at 38 [citations omitted]). The defendant 
must also establish that the issue was necessarily decided in 
the first proceeding ( Acevedo , 69 N.Y.2d at 484-485; Goodman , 69 
N.Y.2d at 40)" ( Sommerville , 3 Misc3d, 598-599). "The 
[collateral estoppel] rule is not to be applied with a 
hypertechnical approach but with realism and rationality" 
(Acevedo, at 69 N.Y.2d at 487, quoting People v. Goodman , 69 
N.Y.2d at 40; see also People v. Roselle , 84 N.Y.2d 350, 357 
[1994]). Applying these principles to the instant case, it is 
evident that collateral estoppel is inapplicable. 

Here, the jury's findings lost their preclusive effect as 
defendant' s federal judgment of conviction was reversed on 
appeal, and therefore, "does not constitute 'a final and valid 

22 



judgment,' the jury's factual findings lose their preclusive 
effect" ( id. , citing People v. Brown , 59 A.D.2d 928 [2d Dept. 
1977]; see also People v. Plew , 52 N.Y.2d 58, 69 [1980] 
[Fuchsberg, J. concurring] ; Matter of McGrath v. Gold , 36 N.Y.2d 
406, 412 [1975]). Moreover, there is no identity of parties and 
issues as the New York County prosecutor did not have a "full 
and fair opportunity" to litigate in defendant's federal matter. 
Accordingly, defendant's motion for an order dismissing the 
instant indictment on collateral estoppel grounds is denied. 

Defendant attempts to get around the problem in his 
arguments by suggesting that the "dual sovereignty" exception to 
the Fifth Amendment does not apply because the State prosecutors 
are acting as a "tool" for the Federal prosecutors and the State 
prosecution is merely a "sham and a cover" masking a second 
prosecution by the same sovereign as the first. However, there 
is no evidence, apart from defendant's speculation, to support 
this claim. Indeed, according to the People, they, upon reading 
the decision of the Second Circuit reversing and dismissing 
defendant's case, decided on their own to see if there was a 
viable State criminal prosecution before approaching the feds . 
Hence, the State prosecution cannot be considered a sham or 
cover for masking a second federal prosecution given the 
differences in the conduct prohibit by the respective statutes. 

23 



As to defendant' s claim that the indictment must be 
dismissed as it is a "vindictive prosecution," the Court finds 
this claim also to be without merit. Defendant claims that he 
is entitled to a presumption of vindictiveness as he speculates 
"that he is being punished not for any crime he may have 
committed, but for having the audacity to exercise his 
constitutional right to appeal his federal sentence and 
conviction and to prevail on that appeal" (DML:54). According 
to defendant, the Second Circuit's reversal of his federal 
conviction was "deeply embarrassing to the United States 
Attorney's Office and the Federal Bureau of Investigations, and 
particularly to the prosecutors and agents involved in the case" 
(DML:54). 4 Accordingly, defendant posits, their animus to 
defendant is the reason for the State prosecution. 

In this case, the State of New York is a separate and 
distinct sovereign than the federal government. Neither stands 
in the shoes of the other. Therefore, the fact that the State 
indicted defendant for violating New York State criminal 
statutes after the Circuit Court of Appeals for the Second 
Circuit overturned defendant' s federal conviction and dismissed 



defendant seems to believe that the embarrassment caused by 
the extensive press coverage in this case relating to the 
reversal of defendant's federal conviction (DML:55). 



24 



the underlying indictment, does not amount to a vindictive 
prosecution as defendant is being prosecuted "by two different 
sovereigns , each acting independently under its own laws and in 
its own interest without any control of or by the other, [thus,] 
render [ing] inapplicable the concept of prosecutorial 
vindictiveness" ( United States v. No , 699 F.2d 63, 68 [2d Cir. 
1983]). Here, DANY, in deciding whether to pursue a subsequent 
prosecution, took into consideration what it deemed to be an 
"inadequate result" obtained in defendant's federal case ( id. ) . 
The fact that DANY did not originally pursue criminal charges 
against defendant in light of the federal proceedings, in no way 
prevents the state government, as represented by DANY, from 
protecting a legitimate New York State interest if it believes 
that defendant' s federal proceeding has failed to adequately 
protect its interests. 

Moreover, defendant has presented no evidence that the 
State of New York was acting at the behest of the federal 
government in bringing the state charges against him, or that 
the federal government acted as an agent of the State in 
prosecuting him for violation of either the EEA or the NSPA. 
Though defendant makes conclusory accusations of conspiracy and 
collusion between the state and federal prosecutors, the record 
indicates simply that, after defendant's federal conviction was 

25 



vacated and the underlying indictment dismissed, DANY undertook 
an independent analysis and concluded that "significant" New 
York State interests "had been left unvindicated by the federal 
proceeding." While defendant complains that the State 
prosecution was motivated by the dissatisfaction of the United 
States Attorney with the outcome of the federal proceeding 
against him as a result of the Second Circuit's decision, even 
assuming arguendo that was a factor in the State's decision to 
prosecute defendant, it was plainly a permissible consideration 
in the assessment of whether the State's interests have been 
vindicated (see United States v. Arena 180 F.3d 380, 389-400 [2d 
Cir. 1999], cert denied 531 US 811 [2000]). 

Even assuming, as defendant does, that the timing of this 
indictment, coupled with the defendant's successful appeal of 
his federal court conviction, raises an inference that the 
prosecution may have been motivated for vindictive reasons , 
these factors alone do not create a presumption of 
vindictiveness ( People v. Bell , 11 Misc3d 1070(A) [Cty. Ct. 
Monroe Co. 2006], aff'd on opinion below 46 AD3d 1465 [4 th Dept. 
2007], citing United States v. Koh , 199 F3d 632, 639-640 [2d 
Cir. 1999]) . Defendant has failed to present any direct 
evidence, such as a statements by a prosecutor that evinces a 
vindictive motive or that the district attorney's office, is, in 

26 



fact, prosecuting defendant for vindictive reasons ( id. ) . 
Therefore, this portion of the defendant's motion must also 
fail. 

Turning to defendant's next claim, namely, that the instant 
indictment should be dismissed in the interests of justice 
pursuant to CPL 210.40, defendant claims that "from July 3, 2009 
to the present date has really been a living hell" for him 
(January 18, 2013 oral argument minutes ["OR"]: 4). Defendant 
complains that he has been "punished enough" because, as a 
result of his federal prosecution, he has lost his home, his 
family, his savings and his reputation (OR:5-6). However, as 
the People noted, "the defendant's conduct [was], in fact, 
criminal conduct. The act of duplicating or re-reproducing 
(sic) computer data or computer program[s] is criminal behavior." 
Accordingly, defendant's motion is denied. 

A Court has the discretion to dismiss a criminal action in 
the interests of justice and fairness so that justice may 
prevail over the strict letter of the law and to prevent a 
miscarriage of justice (see People v. Clayton , 41 A.D.2d 204 [2d 
Dept. 1973]; People v. Andrew , 78 A.D.2d 683 [2d Dept. 1980]; 
CPL 210. 40 [1]). However, the Courts have made it clear that the 
discretionary power to dismiss an indictment in the interest of 
justice is to be used sparingly and should only be granted when 

27 



the facts and circumstances are such that to deny the motion 
would shock the conscience of the Court {see People v. Rickert , 
58 N.Y.2d 122 [1983]; People v. Quadrozzi , 55 AD3d 93, 103 [2d 
Dept. 2008]; People v. Harmon , 181 A.D.2d 34, 36 [1st Dept. 
1992]; People v. Debiasi , 160 A.D.2d 952 [2d Dept. 1990]; ). 
Therefore, the Court must scrutinize the merits of the 
defendant' s application and weigh the respective interests of 
the defendant, the complainant and the general public to see if 
compelling factors must exist that "clearly demonstrat [e] 
that. . .prosecution upon such indictment or count would 
constitute or result in an injustice" (CPL § 210. 40 [1] ; see CPL 
§ 210.20; see also People v. Jenkins , 11 NY3d 282, 287 [2008]; 
People v. Belkota , 50 A.D.2d 118 [4th Dept. 1975]; People v. 
Clayton, 41 A.D.2d, at 208) . 

In deciding a motion to dismiss in the interest of justice, 
the ten factors that the Court must, to the extent applicable, 
examine and consider are: 

(1) seriousness and circumstances of the offense; 

(2) the extent of harm caused by the offense; 

(3) the evidence of guilt, whether admissible at trial 
or not; 

(4) the history, character and condition of the 
defendant; 

(5) any exceptionally serious misconduct of law 

28 



enforcement personnel in the investigation, arrest and 
prosecution of the defendant; 

(6) the purpose and effect of imposing upon the 
defendant a sentence authorized for the offense; 

(7) impact of dismissal on the safety or welfare of the 
community; 

(8) impact of dismissal upon the confidence of the 
public in the criminal justice system; 

(9) where the Court deems it appropriate, the attitude 
of the complainant or victim with respect to the 
motion; and 

(10) any other relevant factors indicating that a 
judgment of conviction would serve no useful purpose 

(CPL 210.40; see People v. Jenkins , 11 NY3d, at 287). 

Considering these factors, both individually and collectively, 

set forth in CPL 210.40(1) (a-j), this Court is not convinced 

that this is the type of extraordinary circumstances 

contemplated by the statute requiring dismissal in the interest 

of justice. 

Turning to these factors, with respect to the seriousness 
and circumstances of the offense, the instant case is neither 
rare nor unusual . Defendant was indicted and accused of 
committing the "E" felony offenses of Unlawful Duplication of 
Computer Material in the First Degree (Penal Law § 156.30 [1]) 
and Unlawful Use of Scientific Material (Penal Law § 165.07) (two 
counts). The counts arise from defendant's alleged scheme to 



29 



steal Goldman Sachs' source code and computer programs by 
copying and reproducing them. As the Court of Appeals has 
recognized, in 1986, the New York State Legislature enacted 
these statutes in an effort to combat the increase in computer 
crime and abuse (see People v . Versaggi , 83 N.Y.2d 123, 128 
[1994]; see also People v. Katakam , 172 Misc. 2d 943, 945 [Sup. 
Ct. N.Y. Co. 1997]). Clearly, these are serious crimes. 

As to the extent of harm caused by the offense, this is not 
a victimless crime. Clearly, Goldman Sachs and their clients 
are victims of defendant' s actions . As the Court in a similar 
case noted, "[t]he harm suffered by Goldman Sachs ... can be 
measured by the cost of their investigation and the disruptions 
they may have suffered" ( People v. Katakam , 172 Misc. 2d, at 949- 
950) . 

As to the evidence of guilt, whether admissible at trial or 
not, it appears to be overwhelming based on the Grand Jury 
presentation. At the Grand Jury presentation, the People 
presented testimony by eyewitnesses, documents and e-mails that 
showed how defendant violated the Unlawful Duplication of 
Computer Material in the First Degree (Penal Law § 156.30 [1]) and 
Unlawful Use of Scientific Material (Penal Law § 165.07) 
statutes . The Court notes that while the Second Circuit reversed 
defendant' s conviction based on a technicality in the federal 

30 



statute, defendant was convicted of similar acts by a federal 
jury. Further, while at defendant's federal trial, defendant's 
supervisor Adam Schlesinger, may have testified that defendant 
had full access to the source code relating to Goldman's HFT 
business and Paul Walker of Goldman, may have testified that as 
part of his job, defendant not only had access to the source code 
and was required to make copies of the code in performing his 
daily functions, defendant was limited to using his access to 
that material within the confines of his employment and not free 
to copy it for any reason unrelated to Goldman's business (see 
DML: 66) . 5 

As to the history, character and condition of the defendant, 
defendant states that he was born in Moscow, Russia and he came 
to the United States determined "to build a successful life" 
(DML: 67) . He further states that he is a father and has had no 
other contact with the law apart from this case . Defendant is a 
"highly skilled programmer who was poised to put his prodigious 
skills back to use" (DML: 67) without any criminal history. 
However, without disputing the defendant's accomplishments, or 
rejecting their significance, his contributions do not justify 
dismissal of charges (see People v. Kelley , 141 A.D.2d 764 [2d 



DML" refers to Defendant's Memorandum of Law. 

31 



Dept. 1988] ["The mere fact that the defendant may be a police 
officer ... or has an exemplary background ... is insufficient to 
justify the exercise of the court's discretion" to dismiss an 
indictment charging the defendant with DUI] [citations omitted] ; 
People v. Varela , 106 A.D.2d 339, 340 [1st Dept. 1984] [dismissal 
in interest of justice not warranted based on defendant's 
" * exemplary' background at work, in the Air Force, as a father 
and as a civic affairs volunteer"] ; see also People v. Norman , 5 
Misc3d 1016 [A] ) . 

Specifically, defendant's argument that the case should be 
dismissed because defendant has already served a year in jail as 
well as "suffered economic [and reputation] loss and humiliation 
as a result of these events is not compelling" ( People v. 
Katakam, 172 Misc. 2d, at 950) . Unfortunately for defendant, his 
character does not warrant a dismissal in the furtherance of 
justice. Indeed, a lack of a prior criminal conviction and 
defendant' s good standing in the community do not constitute 
compelling reasons for dismissal (see People v. Riccelli , 149 
A.D.2d 941, 942 [4 th Dept. 1989]; People v. Varela , 106 A.D.2d, 
at 340; People v. Litman , 99 A.D.2d 573 [3 rd Dept. 1984]). As 
other courts have observed, "[t]he same argument [s] can be made 
by anyone in defendant's position, and ignores the fact that the 
Legislature intended to criminalize the type of behavior of which 

32 



he is accused in order to deter it. Society is ever more 
dependent on the computer and the potential harm by those who are 
in a position to abuse their expertise is considerable. It is 
unfortunate that there may be collateral consequences to 
defendant should he be convicted, but these do not warrant 
dismissal of the indictment" ( People v. Katakam , 172 Misc. 2d, at 
950) . 

As to any exceptionally serious misconduct of law 
enforcement personnel in the investigation, arrest and 
prosecution of the defendant this Court finds that there has been 
none of which the Court is aware. Defendant's complaint of 
misconduct is based on his view that the FBI misled the Court to 
issue an arrest warrant and that the instant prosecution by the 
People is just an extension of the failed federal prosecution is 
meritless. While it is true that the People only chose to 
proceed once the federal courts stated that they did not have 
jurisdiction, there is no evidence that the FBI or the United 
States Attorney for the Southern District of New York in any way 
influenced the People's choice to proceed. 

As to the purpose and effect of imposing upon the defendant 
a sentence authorized for the offense, the purpose of every 
sentence passed on a criminal offender is directed towards 
achieving one or more of four basic ends: deterrence, separation, 

33 



rehabilitation and retribution. The major underlying theory 
behind these sentencing ends is that the fear of possible death, 
incarceratory punishment or suffering will operate in some way in 
the minds of the lawbreakers to deter them from committing future 
criminal acts, thus, resulting in a determinant effect on 
offender recidivism (Burns, Philosophy of Sentencing [U.S. 
District Court, Portland, Oregon] ; The National Judicial College, 
"Sentencing", ABA at University of Nevada, Ch. 1, at 1-5 
[September 1978] as cited in People v. Vecchio , 139 Misc. 2d 165, 
169 [1987] ) . 

Considering, individually and collectively, the "four basic 
ends" to sentencing, defendant faces a potential sentence of up 
to four years imprisonment. The deterrent value in the possible 
maximum sentence is obvious . The retribution end is also obvious 
in the loss of defendant's reputation and his economic loss. 

The Court does not believe rehabilitation is relevant under 
the facts of this case . 

Additionally, in considering the purpose and effect of 
imposing a sentence upon defendant, the State's general interest 
in imposing the authorized sentence is obvious ; the citizens of 
New York have an interest in having a guilty defendant sentenced 
for computer related offenses which are serious offenses . 
Deterrence is a legitimate State's purpose. That the People 

34 



offered defendant a plea to a non-jail sentence is of no moment 
as to whether the indictment should be dismissed. It is the 
Court, and not the People, who decides what the appropriate 
sentence is in any given case, and it will be this Court that 
decides whether a period of incarceration is merited under the 
facts of this case (see People v. Farrer , 52 N.Y.2d 302, 305-306 
[1981]) . Moreover, while defendant focuses on an incarceratory 
sentence, he forgets that there are alternative sentences that 
this Court can also impose such as probation, where defendant's 
conduct would be monitored by the Department of Probation. 

As to the impact of dismissal on the safety or welfare of 
the community, this Court does not believe that a dismissal in 
this case will have any impact one way or the other. 

As to the impact of dismissal upon the confidence of the 
public in the criminal justice system, the Court believes that 
dismissal will have a negative impact. Given the continuing and 
growing reliance on computers, prosecution for these crimes can 
serve to remind the Public that no one is above the law and 
dismissal of the indictment under these circumstances would 
seriously undermine "the confidence of the public in the criminal 
justice system." 

Finally, the defendant has failed to present "any other 
relevant fact indicating that a judgment of conviction would 

35 



serve no useful purpose . " 

The court has evaluated the merits of defendant's arguments, 
as well as the applicable factors enumerated in PL 210.40 and 
found them to be insufficient to rise to the level required for 
the granting of a motion to dismiss in the interest of justice 
(see CPL 210.40; People v. Clayton , 41 A.D.2d, at 204). What has 
been clearly demonstrated is that the offense with which 
defendant is charged is a serious and harmful one and that the 
criteria prescribed in CPL 210.40(1) indicates that dismissal in 
furtherance of justice is inappropriate. Accordingly, the motion 
to dismiss in the interest of justice is denied. 

Defendant' s motion for a Huntley-Mapp-Dunaway hearing is 
granted. 

Defendant's motion for discovery, including with respect to 
how the People came to initiate the instant prosecution and the 
entire Goldman Trading System, is granted to the extent supplied 
by the People. However, if defendant believes that any response 
to his demand for Discovery or his request for a Bill of 
Particulars is inadequate, he may move to reargue within 10 days 
of the service of a copy of this Pretrial Decision and Order. 
The People are directed to preserve all evidence including 
electronically recorded matter and physical exhibits seized by 
law enforcement officials or their agents, and all notes, records 

36 



memoranda and reports prepared by law enforcement officials or 
their agents , including all recorded police communications . 

Specifically, the Court notes that discovery matters are 
"regulated by statute", i.e. CPL Article 240 ( Matter of Miller v. 
Schwartz, 72 N.Y.2d 869, 870 [1988]; see People v. Colavito , 87 
N.Y.2d 423, 427 [1996]; Cons tan tine v. Leto , 157 A.D.2d 376, 378 
[3d Dept. 1990], af f ' d 77 N.Y.2d 975 [1991]) and may not be 
circumvented by the use of a subpoena. A subpoena may also not 
be used merely to ascertain the existence of evidence (see Matter 
of Terry D. , 81 N.Y.2d 1042, 1044 [1993]; People v. Gissendanner , 
48 N.Y.2d 543, 551 [1979]; People v. Wallace , 239 A.D.2d 272, 273 
[1st Dept. 1997] ; ( Matter of Office of Attorney Gen, of State of 
N.Y. . 269 A.D.2d 1, 13 [1 st Dept. 2000]; Law Firm of Ravi Batra . 
P.C. v. Rabinowich , 77 AD3d 532, 533 [1 st Dept. 2010]). Indeed, 
a defendant may not use a subpoena to conduct a "fishing 
expedition" ( United States v. Nixon , 418 U.S. 683, 700 [1974]), 
in the hope of "unearthing [ ] some unspecified information" that 
he is not entitled to under the discovery statutes or otherwise 
( Gissendanner , 48 N.Y. 2d at 549; see People v. Villacorte , 76 
AD3d 911 [1 st Dept.], lv. denied 15 NY3d 956 [2010]). Rather, a 
subpoena must seek "to compel the production of specific 
documents that are relevant and material to facts at issue in a 
pending judicial proceeding." Matter of Terry D. , 81 N.Y. 2d, at 

37 



1044 (internal quotations omitted) . 

Indeed, defendant must put forth "some factual predicate" 
that would make it "reasonably likely that the documentary 
information will bear relevant and exculpatory evidence" and not 
just potentially relevant evidence ( Constantine v. Leto , 157 
A.D.2d 376, 378 [3d Dept. 1990], af f ' d 77 N.Y.2d 975 [1991]; 
Gissendanner , 48 N.Y.2d at 548-550; see Villacorte , 76 AD3d 911 
[1 st Dept. 2010]) . The showing may not be based on speculation 
( People v. Baldwin , 211 A.D.2d 638 [2nd Dept. 1995]). 
Additionally, a subpoena may not be overbroad nor unreasonably 
burdensome as a "witness is not required to cull the good from 
the bad" ( People v. Doe , 39 A.D.2d 869, 870 [1st Dept. 1972]; see 
Matter of Grand Jury Subpoenas , 72 N.Y.2d 307, 315-16 [1988]; 
Hynes v. Moskowitz , 44 N.Y.2d 383, 394 [1978]; People v. 
Zilberman , 297 A.D.2d 517 [1st Dept. 2002]). 

With this in mind, the People argue that defendant, having 
been provided with all the discovery to which he is entitled in 
the People's Voluntary Disclosure Form ("VDF") , is attempting to 
obtain more than that which he is entitled (People's MOL: 56) . 
They accuse him, in effect, of being on a fishing expedition. 
The Court agrees . 

With respect to defendant' s specific request for discovery 
into the circumstances under which the New York County District 

38 



Attorney's Office ("DANY") decided to indict him, including but 
not limited to leave to subpoena the DANY and its files and 
communications regarding defendant and to take depositions of 
DANY attorneys and staff, the People in their response to 
defendant' s motion have disclosed all the facts about how the 
instant prosecution was initiated to which defendant is entitled 
under CPL 240.20. 

With respect to defendant's application to "inspect" 
Goldman's Trading System and "to make such tests and inspections 
to aid his expert witnesses who will be called at trial (Defense 
MOL:96). Goldman's computer system is not discoverable nor is the 
"entire Trading System" (Defense MOL: 96) within the People's 
possession, custody or control nor do they intend to introduce 
the entire system into evidence at trial (see CPL 240.20; People 
v . Robinson , 53 AD3d 63, 73-74 [2d Dept. 2008]; People v. 
Villacorte , 76 AD3d 911 [1 st Dept.]), lv. denied 15 NY3d 
956 [2010]). Indeed, the People state that they will only 
introduce the specific materials defendant is charged with 
copying and transferring (People's MOL: 57). Therefore, all 
defendant is entitled to receive is those materials defendant is 
charged with misappropriating, material to which both the Court 
and the People believe that defendant and his experts already 
have access (see United States v. Lee , U.S. dist Lexis 24972, at 

39 



*7 (ND Cal 2009) . 

The Court also finds that defendant' s request for access to 
the entire Goldman Trading System to be overbroad and based on 
little or no factual predicate. A subpoena is not meant to be 
used as a general investigative tool, but rather as a means of 
targeting specific documents (see Cons tan tine . 157 A.D.2d at 
378) . 

Based on the submissions before the Court, it is clear that 
the contents of Goldman's "entire Trading System" are not at 
issue nor is it necessary for defendant to inspect any of 
Goldman's confidential and proprietary material that is unrelated 
to the charges in this case. Accordingly, the request for 
discovery and inspection of the entire Goldman Trading System is 
denied . 



ENTER; 




Dated; April 5, 2013 



40